Академический Документы
Профессиональный Документы
Культура Документы
-using a counterfeit credit card to buy stuffs for your own gain.
-stealing another person’s credit card and using it to purchase gift cards to use and transfer to cash.
-snatching an unaware person’s cellular device and using it to ask for money to not let all the content
of the phone to spread.
3. inducing, enticing, permitting or in any manner allowing another, for consideration or otherwise to
produce, use, traffic in counterfeit access devices, unauthorized access devices or access devices
fraudulently applied for;
Examples;
-asking for tech-support to a site to a supposed to be person to help you fix your PC through giving
them access to your PC yet it turns out he/she puts a virus in your PC and asks for money to fix
what they did to your PC.
- using of smartphones to text and deceive people on clicking the said message saying a family
member of them is at grave danger giving them access to their SIM card to send a load.
5. obtaining money or anything of value through the use of an access device, with intent to defraud
or with intent to gain and fleeing thereafter;
-using the internet to deceive people through a sad story and you need to click something to donate
and after donating you’ll never hear from him/her again.
-having people donate money to your account because you said that their money will be doubled in
a month.
.